First published: Tue Apr 14 2020(Updated: )
A flaw was found in the way the TLS implementation in the JSSE component of OpenJDK re-used single null TLS sessions for new TLS connections. A remote attacker could possibly use this flaw to impact availability of a Java application providing TLS server.
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JSSE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1823960 is considered moderate due to its potential impact on the availability of Java applications using TLS.
To fix REDHAT-BUG-1823960, you should update to the latest version of OpenJDK that addresses this TLS implementation flaw.
REDHAT-BUG-1823960 affects certain versions of the JSSE component in OpenJDK implementations.
Yes, REDHAT-BUG-1823960 can allow a remote attacker to impact the availability of a Java application providing TLS services.
Currently, the recommended approach for REDHAT-BUG-1823960 is to apply the applicable security updates rather than relying on workarounds.